Configuration/Environment manipulation
Attack Pattern ID: 176 (Standard Attack Pattern Completeness: Stub)Typical Severity: MediumStatus: Draft
+ Description

Summary

An attacker manipulates files or settings external to a target application which affect the behavior of that application. For example, many applications use external configuration files and libraries - modification of these entities or otherwise affecting the application's ability to use them would constitute a configuration/environment manipulation attack.

+ Attack Prerequisites

The target application must consult external files or configuration controls to control its execution. All but the very simplest applications meet this requirement.

+ Resources Required

The attacker must have the access necessary to affect the files or other environment items the targeted application uses for its operations.

+ Related Attack Patterns
NatureTypeIDNameDescriptionView(s) this relationship pertains toView\(s\)
ChildOfCategoryCategory262Resource Manipulation 
Mechanism of Attack (primary)1000
ParentOfAttack PatternAttack Pattern75Manipulating Writeable Configuration Files 
Mechanism of Attack (primary)1000
ParentOfAttack PatternAttack Pattern96Block Access to Libraries 
Mechanism of Attack (primary)1000
ParentOfAttack PatternAttack Pattern159Redirect Access to Libraries 
Mechanism of Attack (primary)1000
ParentOfAttack PatternAttack Pattern203Manipulate Application Registry Values 
Mechanism of Attack (primary)1000